CVE Vulnerabilities

CVE-2022-22514

Untrusted Pointer Dereference

Published: Apr 07, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVSS 2.x
4.9 MEDIUM
AV:N/AC:M/Au:S/C:N/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An authenticated, remote attacker can gain access to a dereferenced pointer contained in a request. The accesses can subsequently lead to local overwriting of memory in the CmpTraceMgr, whereby the attacker can neither gain the values read internally nor control the values to be written. If invalid memory is accessed, this results in a crash.

Weakness

The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.

Affected Software

NameVendorStart VersionEnd Version
Control_for_beaglebone_slCodesys*4.5.0.0 (excluding)
Control_for_beckhoff_cx9020Codesys*4.5.0.0 (excluding)
Control_for_empc-a/imx6_slCodesys*4.5.0.0 (excluding)
Control_for_iot2000_slCodesys*4.5.0.0 (excluding)
Control_for_linux_slCodesys*4.5.0.0 (excluding)
Control_for_pfc100_slCodesys*4.5.0.0 (excluding)
Control_for_pfc200_slCodesys*4.5.0.0 (excluding)
Control_for_plcnext_slCodesys*4.5.0.0 (excluding)
Control_for_raspberry_pi_slCodesys*4.5.0.0 (excluding)
Control_for_wago_touch_panels_600_slCodesys*4.5.0.0 (excluding)
Control_rte_slCodesys*3.5.18.0 (excluding)
Control_rte_sl_(for_beckhoff_cx)Codesys*3.5.18.0 (excluding)
Control_runtime_system_toolkitCodesys*3.5.18.0 (excluding)
Control_win_slCodesys*3.5.18.0 (excluding)
Development_systemCodesys3.0 (including)3.5.18.0 (excluding)
Edge_gatewayCodesys*3.5.18.0 (excluding)
Edge_gatewayCodesys*4.5.0.0 (excluding)
Embedded_target_visu_toolkitCodesys*3.5.18.0 (excluding)
GatewayCodesys*3.5.18.0 (excluding)
Hmi_slCodesys*3.5.18.0 (excluding)
Remote_target_visu_toolkitCodesys*3.5.18.0 (excluding)

Extended Description

An attacker can supply a pointer for memory locations that the product is not expecting. If the pointer is dereferenced for a write operation, the attack might allow modification of critical state variables, cause a crash, or execute code. If the dereferencing operation is for a read, then the attack might allow reading of sensitive data, cause a crash, or set a variable to an unexpected value (since the value will be read from an unexpected memory location). There are several variants of this weakness, including but not necessarily limited to:

References